Professional Documents
Culture Documents
Ccna 2 Rse 6
Ccna 2 Rse 6
A notification is sent.
A syslog message is logged.
Packets with unknown source addresses will be dropped.
The interface will go into error-disabled state.
Explanation:
Interface FastEthernet 0/1 is configured with the violation mode of protect. If th
FastEthernet 0/1 will drop packets with unknown MAC addresses.
Explanation:
The violation mode can be viewed by issuing the show port-security interface <int
FastEthernet 0/1 is configured with the violation mode of protect. If there is a viola
will drop packets with unknown MAC addresses.
1. The buffers for packet processing and the running configuration file
are temporarily stored in which type of router memory?
o flash
o NVRAM
o RAM*
o ROM
RAM provides temporary storage for the running IOS, the running configuration
file, the IP routing table, ARP table, and buffers for packet processing. In
contrast, permanent storage of the IOS is provided by flash. NVRAM provides
permanent storage of the startup configuration file, and ROM.provides
permanent storage of the router bootup instructions and a limited IOS.
2. Refer to the exhibit. A company has an internal network of
192.168.10.0/24 for their employee workstations and a DMZ network of
192.168.3.0/24 to host servers. The company uses NAT when inside hosts
connect to outside network. A network administrator issues the show ip
nat translations command to check the NAT configurations. Which one of
source IPv4 addresses is translated by R1 with PAT
o 10.0.0.31
o 192.168.3.5
o 192.168.3.33
o 192.168.10.35*
o 172.16.20.5
3. Refer to the exhibit. This network has two connections to the ISP, one
via router C and one via router B. The serial link between router A and
router C supports EIGRP and is the primary link to the Internet. If the
primary link fails, the administrator needs a floating static route that
avoids recursive route lookups and any potential next-hop issues caused
by the multiaccess nature of the Ethernet segment with router B. What
should the administrator configure?
o 1
o 2*
o 3
o 4
o 5
o 6
H1 creates the first Layer 2 header. The R1 router has to examine the
destination IP address to determine how the packet is to be routed. If the packet
is to be routed out another interface, as is the case with R1, the router strips the
current Layer 2 header and attaches a new Layer 2 header. When R2
determines that the packet is to be sent out the LAN interface, R2 removes the
Layer 2 header received from the serial link and attaches a new Ethernet header
before transmitting the packet.
10. What command will enable a router to begin sending messages that
allow it to configure a link-local address without using an IPv6 DHCP
server?
o a static route
o the ipv6 route ::/0 command
o the ipv6 unicast-routing command*
o the ip routing command
To enable IPv6 on a router you must use the ipv6 unicast-routing global
configuration command or use the ipv6 enable interface configuration command.
This is equivalent to entering ip routing to enable IPv4 routing on a router when
it has been turned off. Keep in mind that IPv4 is enabled on a router by default.
IPv6 is not enabled by default.
11. Which switching method provides error-free data transmission?
o fragment-free
o fast-forward
o integrity-checking
o store-and-forward*
12. Which problem is evident if the show ip interface command shows that
the interface is down and the line protocol is down?
o A cable has not been attached to the port.*
o There is an IP address conflict with the configured address on the
interface.
o The no shutdown command has not been issued on the interface.
o An encapsulation mismatch has occurred.
If an interface has not been brought up with the no shutdown command, the
interface status shows administratively down. A duplicate IP address will not
bring an interface down. An encapsulation error is normally found using the
show interfaces command.
13. A company security policy requires that all MAC addressing be
dynamically learned and added to both the MAC address table and the
running configuration on each switch. Which port security configuration
will accomplish this?
o auto secure MAC addresses
o dynamic secure MAC addresses
o static secure MAC addresses
o sticky secure MAC addresses*
With sticky secure MAC addressing, the MAC addresses can be either
dynamically learned or manually configured and then stored in the address table
and added to the running configuration file. In contrast, dynamic secure MAC
addressing provides for dynamically learned MAC addressing that is stored only
in the address table.
14. Refer to the exhibit. A small business uses VLANs 8, 20, 25, and 30 on
two switches that have a trunk link between them. What native VLAN
should be used on the trunk if Cisco best practices are being
implemented?
o 1
o 5*
o 8
o 20
o 25
o 30
Cisco recommends using a VLAN that is not used for anything else for the
native VLAN. The native VLAN should also not be left to the default of VLAN 1.
VLAN 5 is the only VLAN that is not used and not VLAN 1.
15. A network administrator is configuring an ACL with the command
access-list 10 permit 172.16.32.0 0.0.15.255. Which IPv4 address matches
the ACE?
o 172.16.20.2
o 172.16.26.254
o 172.16.45.2*
o 172.16.48.5
With the wildcard mask of 0.0.15.255, the IPv4 addresses that match the ACE
are in the range of 172.16.32.0 to 172.16.47.255.
16. The PT initialization was skipped. You will not be able to view the PT
activity.
Open the PT Activity. Perform the tasks in the activity instructions and
then answer the question.
Which code is displayed on the web browser?
o Inter-VLANonfigured!
o It works!*
o Welldone!
o Grea
17. Which command is issued in the VTY line configuration mode to apply
a standard ACL that will control Telnet access to a router?
o access-group 11 in
o access-class 11 in*
o access-list 11 in
o access-list 110 in
The access-class 11 in command applies a standard ACL to the VTY lines of a
router to control Telnet and SSH access. The access-group 11 in command
would be issued on a router interface to apply an ACL, and because it applies a
standard ACL, all IP traffic will be filtered, not just Telnet and SSH
communications bound for the VTY lines. The access-list command creates the
access control expressions of an ACL but do not apply the ACl to a router
interface or line.
18. Which series of commands will cause access list 15 to restrict Telnet
access on a router?
o R1(config)# line vty 0 4
R1(config-line)# ip access-group 15 in
o R1(config)# int gi0/0
R1(config-if)# ip access-group 15 in
o R1(config)# line vty 0 4
R1(config-line)# access-class 15 in*
o R1(config)# int gi0/0
R1(config-if)# access-class 15 in
Once an access list to restrict Telnet or SSH access has been created, it is
applied to the vty lines with the access-class command. This will restrict Telnet
or SSH access.
19. Which three statements accurately describe VLAN types? (Choose
three).
o A management VLAN is any VLAN that is configured to access
management features of the switch.*
o A data VLAN is used to carry VLAN management data and user-
generated traffic.
o Voice VLANs are used to support user phone and e-mail traffic on a
network.
o VLAN 1 is always used as the management VLAN.
o After the initial boot of an unconfigured switch, all ports are
members of the default VLAN.*
o An 802.1Q trunk port, with a native VLAN assigned, supports
both tagged and untagged traffic.*
20. A client is using SLAAC to obtain an IPv6 address for its interface.
After an address has been generated and applied to the interface, what
must the client do before it can begin to use this IPv6 address?
o It must send a DHCPv6 INFORMATION-REQUEST message to
request the address of the DNS server.
o It must send an ICMPv6 Router Solicitation message to determine
what default gateway it should use.
o It must send a DHCPv6 REQUEST message to the DHCPv6 server
to request permission to use this address.
o It must send an ICMPv6 Neighbor Solicitation message to
ensure that the address is not already in use on the network.*
Stateless DHCPv6 or stateful DHCPv6 uses a DHCP server, but Stateless
Address Autoconfiguration (SLAAC) does not. A SLAAC client can automatically
generate an address that is based on information from local routers via Router
Advertisement (RA) messages. Once an address has been assigned to an
interface via SLAAC, the client must ensure via Duplicate Address Detection
(DAD) that the address is not already in use. It does this by sending out an
ICMPv6 Neighbor Solicitation message and listening for a response. If a
response is received, then it means that another device is already using this
address.
21. Which DHCP IPv4 message contains the following information?
Destination address: 255.255.255.255
Client IPv4 address: 0.0.0.0
Default gateway address: 0.0.0.0
Subnet mask: 0.0.0.0
o DHCPACK
o DHCPDISCOVER*
o DHCPOFFER
o DHCPREQUEST
A client will first send the DHCPDISCOVER broadcast message to find DHCPv4
servers on the network. This message will have the limited broadcast address,
255.255.255.255, as the destination address. The client IPv4 address, the
default gateway address, and subnet fields will all be 0.0.0.0 because these
have not yet been configured on the client. When the DHCPv4 server receives a
DHCPDISCOVER message, it reserves an available IPv4 address to lease to
the client and sends the unicast DHCPOFFER message to the requesting client.
When the client receives the DHCPOFFER from the server, it sends back a
DHCPREQUEST broadcast message. On receiving the DHCPREQUEST
message, the server replies with a unicast DHCPACK message.
22. A network administrator is implementing DHCPv6 for the company.
The administrator configures a router to send RA messages with M flag as
1 by using the interface command ipv6 nd managed-config-flag. What
effect will this configuration have on the operation of the clients?
o Clients must use the information that is contained in RA messages.
o Clients must use all configuration information that is provided
by a DHCPv6 server.*
o Clients must use the prefix and prefix length that are provided by RA
messages and obtain additional information from a DHCPv6 server.
o Clients must use the prefix and prefix length that are provided by a
DHCPv6 server and generate a random interface ID.
Under stateful DHCPv6 configuration, which is indicated by setting M flag as 1
(through the interface command ipv6 nd managed-config-flag), the dynamic IPv6
address assignments are managed by the DHCPv6 server. Clients must obtain
all configuration information from a DHCPv6 server.
23. Refer to the exhibit. The users on the LAN network of R1 cannot
receive an IPv6 address from the configured stateful DHCPv6 server. What
is missing from the stateful DHCPv6 configuration on router R1?
o 10.130.5.76
o 209.165.200.245*
o 172.16.1.10
o 203.0.113.5
o 192.0.2.1
o 172.16.1.1
Because the packet is between R2 and the web server, the source IP address is
the inside global address of PC, 209.165.200.245.
25. Refer to the exhibit. R1 is configured for NAT as displayed. What is
wrong with the configuration?
o The DNS server and the default gateway router should be in the
same subnet.
o The IP address of the default gateway router is not contained in
the excluded address list.*
o The default-router and dns-server commands need to be configured
with subnet masks.
o The IP address of the DNS server is not contained in the excluded
address list.
In this configuration, the excluded address list should include the address that is
assigned to the default gateway router. So the command should be ip dhcp
excluded-address 192.168.10.1 192.168.10.9.
28. Fill in the blank.
In IPv6, all routes are level ___ ultimate routes.Correct Answer: 1*
IPv6 is classless by design, making all routes level 1 ultimate routes by default.
29. Fill in the blank.
The acronym ___ describes the type of traffic that requires a separate VLAN,
strict QoS requirements, and a one-way overall delay less than 150 ms across
the network. These restrictions help to ensure traffic quality.Correct Answer:
voip*
VoIP traffic tends to have a separate VLAN to ensure that voice quality is
maintained. VoIP traffic requires:
assured bandwidth to ensure voice quality
transmission priority over other types of network traffic
ability to be routed around congested areas on the network
delay of less than 150 ms across the network
30. Refer to the exhibit. A network administrator has just configured
address translation and is verifying the configuration. What three things
can the administrator verify? (Choose three.)
When the network administrator enters the command show ip route, the
route is not in the routing table. What should the administrator do next?
o Re-enter the command using a network number rather than a usable
IP address.
o Verify that the serial 0/0/1 interface is active and available.*
o Re-enter the command using the correct mask.
o Verify that the 192.168.10.64 network is active within the network
infrastructure.
The reason that a correctly typed static network would not go into the routing
table is if the exit interface is not available. The 192.168.10.64 is a valid network
number and that route does not have to be “up and up” in order for a static route
to be configured on a remote router.
41. Refer to the exhibit. How did the router obtain the last route that is
shown?
o 1*
o 120
o 0
o 2
Router 2 is using a static route to reach network 10.10.0.0 and static routes
have an administrative distance of 1.
44. Refer to the exhibit. Which type of route is 172.16.0.0/16?
o ultimate route
o level 1 parent route*
o child route
o default route
A level 1 parent route displays the classful network address, the number of
subnets, and the number of different subnet masks that the classful address has
been subdivided into. It does not have an exit interface. A child route, ultimate
route, and default route all have exit interfaces that are associated with them.
45. What is the name of the layer in the Cisco borderless switched network
design that would have more switches deployed than other layers in the
network design of a large organization?
o data link
o core
o network access
o access*
o network
Access layer switches provide user access to the network. End user devices,
such as PCs, access points, printers, and copiers, would require a port on a
switch in order to connect to the network. Thus, more switches are needed in
the access layer than are needed in the core and distribution layers.
46. What is a function of the distribution layer?
o high-speed backbone connectivity
o interconnection of large-scale networks in wiring closets*
o network access to the user
o fault isolation
The distribution layer interacts between the access layer and the core by
aggregating access layer connections in wiring closets, providing intelligent
routing and switching, and applying access policies to access the rest of the
network. Fault isolation and high-speed backbone connectivity are the primary
functions of the core layer. The main function of the access layer is to provide
network access to the user.
47. Which network design principle focuses on the capability of on-
demand seamless network expansion in a switched network?
o flexibility
o modularity*
o resiliency
o hierarchical
There are several sound network design principles that should be used when
building design guidelines for a borderless switched network:
Hierarchical – Defines the role of each device at every tier, simplifies
deployment, operation, and management, and reduces fault domains at every
tier
Modularity – Allows seamless network expansion and integrated service
enablement on an on-demand basis
Resiliency – Satisfies user expectations for keeping the network always on
Flexibility – Allows intelligent traffic load sharing by using multiple network
resources simultaneously
48. A lab in a network management software company is configuring a
testing environment to verify the performance of new software with
different network connectivity speeds, including FastEthernet,
GigabitEthernet, and 10 GigabitEthernet, and with copper and fiber optic
connections. Which type of switch should the software company purchase
to perform the tests?
o fixed configuration
o access layer
o modular configuration*
o stackable
A modular configuration switch is used at the distribution and core layers. A
modular configuration switch usually takes 3 rack units or more. Modular
configuration switches offer more flexibility in the types and number of ports as
well as the expansion cards that can be used. A fixed configuration switch tends
to be an access layer switch. Stackable switches are usually access layer
switches that have been cabled together.
49. What two license conditions would be expected on a new Cisco router
once the license has been activated? (Choose two.)
o License Type: Permanent*
o License Type: ipbasek9
o License Type: Temporary
o License State: On
o License State: Active, In Use*
o License State: Active, Registered
When the show license command is issued, the following information is a
sample of what would be found once the license has been activated:
Index 1 Feature: ipbasek9
Period left: Life time
License Type: Permanent
License State: Active, In Use
License Count: Non-Counted
License Priority: Medium
It is important for a technician to be able to verify an activated IOS 15 license.
50. In an IPv6 routing table, all routing table entries are classified as which
type of routes?
o level 2 child routes
o level 1 parent routes
o level 1 ultimate routes*
o level 1 network routes
IPv6 is classless by design, making all routes level 1 ultimate routes by default.
51. Which type of traffic requires a separate VLAN, strict QoS
requirements, and a one-way overall delay of less than 150 ms across the
network?
o video
o POP/IMAP
o HTTP
o VoIP*
VoIP traffic tends to have a separate VLAN to ensure that voice quality is
maintained. VoIP traffic requires the following:
• Assured bandwidth to ensure voice quality
• Transmission priority over other types of network traffic
• Ability to be routed around congested areas on the network
• Delay of less than 150 ms across the network
52. What information is added to the switch table from incoming frames?
o destination MAC address and incoming port number
o destination IP address and incoming port number
o source MAC address and incoming port number*
o source IP address and incoming port number
A switch “learns” or builds the MAC address table based on the source MAC
address as a frame comes into the switch. A switch forwards the frame onward
based on the destination MAC address.
53. Which statement correctly describes how a LAN switch forwards
frames that it receives?
o Cut-through frame forwarding ensures that invalid frames are always
dropped.
o Only frames with a broadcast destination address are forwarded out
all active switch ports.
o Frame forwarding decisions are based on MAC address and
port mappings in the CAM table.*
o Unicast frames are always forwarded regardless of the destination
MAC address.
Cut-through frame forwarding reads up to only the first 22 bytes of a frame,
which excludes the frame check sequence and thus invalid frames may be
forwarded. In addition to broadcast frames, frames with a destination MAC
address that is not in the CAM are also flooded out all active ports. Unicast
frames are not always forwarded. Received frames with a destination MAC
address that is associated with the switch port on which it is received are not
forwarded because the destination exists on the network segment connected to
that port..
Older Version
1.
1. How will a router handle static routing differently if Cisco
Express Forwarding is disabled?
It will not perform recursive lookups.
Serial point-to-point interfaces will require fully specified static
routes to avoid routing inconsistencies.
Ethernet multiaccess interfaces will require fully specified
static routes to avoid routing inconsistencies.*
Static routes that use an exit interface will be unnecessary.
2. Refer to the exhibit. R1 was configured with the static route
command ip route 209.165.200.224 255.255.255.224 S0/0/0 and
consequently users on network 172.16.0.0/16 are unable to reach
resources on the Internet. How should this static route be changed to
allow user traffic from the LAN to reach the Internet?
2001:DB8:CAFE:2::/64
LLA: FE80::2*
2001:DB8:CAFE:A001::/64
The router ID has to be manually configured.
19. Which two pieces of information are required when creating a
standard access control list? (Choose two.)
destination address and wildcard mask
source address and wildcard mask*
subnet mask and wildcard mask
access list number between 100 and 199
access list number between 1 and 99*
20. Which two keywords can be used in an access control list to
replace a wildcard mask or address and wildcard mask pair? (Choose
two.)
most
host*
all
any*
some
gt
21. What is the effect of the access control list wildcard mask
0.0.0.15? (Choose two.)
The first 28 bits of a supplied IP address will be ignored.
The last four bits of a supplied IP address will be
ignored.*
The first 32 bits of a supplied IP address will be matched.
The first 28 bits of a supplied IP address will be matched.*
The last five bits of a supplied IP address will be ignored.
The last four bits of a supplied IP address will be matched.
22. An administrator created and applied an outbound Telnet
extended ACL on a router to prevent router-initiated Telnet sessions.
What is a consequence of this configuration?
The ACL will not work as desired because an outbound
ACL cannot block router-initiated traffic.*
The ACL will work as desired as long as it is applied to the
correct interface.
The ACL will not work because only standard ACLs can be
applied to vty lines.
The ACL will work as long as it will be applied to all vty lines.
23. A network administrator is testing IPv6 connectivity to a web
server. The network administrator does not want any other host to
connect to the web server except for the one test computer. Which type
of IPv6 ACL could be used for this situation?
only a standard ACL
a standard or extended ACL
only an extended ACL
an extended, named, or numbered ACL
only a named ACL *
24. What does an OSPF area contain?
routers that share the same router ID
routers whose SPF trees are identical
routers that have the same link-state information in their
LSDBs*
routers that share the same process ID
25. What is the effect of entering the network 192.168.10.1 0.0.0.0
area 0 command in router configuration mode?
The interface with the IPv4 address 192.168.10.1 will be a
passive interface.
OSPF advertisements will include the network on the
interface with the IPv4 address 192.168.10.1.*
This command will have no effect because it uses a quad zero
wildcard mask.
OSPF advertisements will include the specific IPv4 address
192.168.10.1.
26. What is the order of packet types used by an OSPF router to
establish convergence?
Hello, LSAck, LSU, LSR, DBD
LSAck, Hello, DBD, LSU, LSR
Hello, DBD, LSR, LSU, LSAck*
LSU, LSAck, Hello, DBD, LSR
27. What best describes the operation of distance vector routing
protocols?
They use hop count as their only metric.
They only send out updates when a new network is added.
They send their routing tables to directly connected
neighbors.*
They flood the entire network with routing updates.
28. What is an advantage of using dynamic routing protocols
instead of static routing?
easier to implement
more secure in controlling routing updates
fewer router resource overhead requirements
ability to actively search for new routes if the current path
becomes unavailable*
29. Refer to the exhibit. R1 and R2 are OSPFv3 neighbors. Which
address would R1 use as the next hop for packets that are destined for
the Internet?
FF02::5
2001:DB8:ACAD:1::2
2001:DB8:C5C0:1::2
FE80::21E:BEFF:FEF4:5538*
30. Refer to the exhibit. What address will be used as the router ID
for the OSPFv3 process?
1.1.1.1
10.1.1.1*
192.168.1.1
2001:DB8:CAFE:1::1
2001:DB8:ACAD:1::1
31. Which network design may be recommended for a small
campus site that consists of a single building with a few users?
a network design where the access and core layers are
collapsed into a single layer
a collapsed core network design*
a three-tier campus network design where the access,
distribution, and core are all separate layers, each one with very specific
functions
a network design where the access and distribution layers are
collapsed into a single layer
32. When does a switch use frame filtering?
The destination MAC address is for a host on a different
network segment from the source of the traffic.
The destination MAC address is for a host on the same
network segment as the source of the traffic.*
The destination MAC address is for a host with no entry in the
MAC address table.
The destination MAC address is for a host on a network
supported by a different router.
33. Which command will verify the status of both the physical and
the virtual interfaces on a switch?
show running-config
show ip interface brief*
show startup-config
show vlan
34. Refer to the exhibit. A network administrator is investigating a
lag in network performance and issues the show interfaces fastethernet
0/0 command. Based on the output that is displayed, what two items
should the administrator check next? (Choose two.)
cable lengths*
damaged cable termination
duplex settings*
electrical interference
incorrect cable types
35. Which command would be best to use on an unused switch port
if a company adheres to the best practices as recommended by Cisco?
shutdown*
ip dhcp snooping
switchport port-security mac-address sticky
switchport port-security violation shutdown
switchport port-security mac-address sticky mac-address
36. Which two commands should be implemented to return a Cisco
3560 trunk port to its default configuration? (Choose two.)
S1(config-if)# no switchport trunk allowed vlan*
S1(config-if)# no switchport trunk native vlan*
S1(config-if)# switchport mode dynamic desirable
S1(config-if)# switchport mode access
S1(config-if)# switchport access vlan 1
37. Which two methods can be used to provide secure management
access to a Cisco switch? (Choose two.)
Configure all switch ports to a new VLAN that is not VLAN 1.
Configure specific ports for management traffic on a
specific VLAN. *
Configure SSH for remote management.*
Configure all unused ports to a “black hole.”
Configure the native VLAN to match the default VLAN.
38. Refer to the exhibit. A network administrator is configuring
inter-VLAN routing on a network. For now, only one VLAN is being used,
but more will be added soon. What is the missing parameter that is
shown as the highlighted question mark in the graphic?
CONFIGURATION
SW0(config)#interface vlan 10
SW0(config-if)#ip address 192.168.63.2 255.255.255.0
SW0(config-if)#exit
SW0(config)#ip default-gateway 192.168.63.1
SW0(config)#end
47. Which command will create a static default route on R1 to send
all traffic to the Internet and use serial 0/0 as the exit interface?
R1(config)# ip route 255.255.255.255 0.0.0.0 serial 0/0
R1(config)# ip route 0.0.0.0 255.255.255.0 serial 0/0
R1(config)# ip route 0.0.0.0 255.255.255.255 serial 0/0
R1(config)# ip route 0.0.0.0 0.0.0.0 serial 0/0*
48. What is a result of connecting two or more switches together?
The number of collision domains is reduced.
The size of the broadcast domain is increased.*
The number of broadcast domains is increased.
The size of the collision domain is increased.
49. What is meant by the term “best match” when applied to the
routing table lookup process?
exact match
longest match*
network match
supernet match
50. A router with two LAN interfaces, two WAN interfaces, and one
configured loopback interface is operating with OSPF as its routing
protocol. What does the router OSPF process use to assign the router
ID?
the highest IP address that is configured on the WAN
interfaces
the IP address of the interface that is configured with priority 0
the highest IP address on the LAN interfaces
the OSPF area ID that is configured on the interface with the
highest IP address
the loopback interface IP address*
51. Order the DHCP process steps. (Not all options are used.)
A Layer 3 switch routes for three VLANs and connects to a router for
Internet connectivity. Which two configurations would be applied to the
switch? (Choose two.)
(config)# interface gigabitethernet1/1
(config-if)# switchport mode trunk
(config)# interface fastethernet0/4
(config-if)# switchport mode trunk
(config)# interface gigabitethernet 1/1
(config-if)# no switchport
(config-if)# ip address 192.168.1.2 255.255.255.252*
(config)# interface vlan 1
(config-if)# ip address 192.168.1.2 255.255.255.0
(config-if)# no shutdown
(config)# ip routing*
56. Which characteristic is unique to EIGRP?
EIGRP supports classless routing.
EIGRP supports loop-free autosummarization.
EIGRP supports both IPv4 and IPv6.
EIGRP supports unequal-cost load balancing.*
57. Match the router memory type that provides the primary storage
for the router feature. (Not all options are used.)
B = 209.165.201.7
A = 10.1.0.13*
B = 10.0.254.5
B = 209.165.201.1*
A = 209.165.201.2
12. When creating an IPv6 static route, when must a
next-hop IPv6 address and an exit interface both be
specified
when CEF is enabled
when the static route is a default route
when the next hop is a link-local address*
when the exit interface is a point-to-point interface
Routing and Switching Essentials
2.2.3 Configure IPv6 Static Routes
Link-local addresses are only unique on a given link, and
the same address could exist out multiple interfaces. For
that reason, any time a static route specifies a link-local
address as the next hop, it must also specify the exit
interface. This is called a fully specified static route.
13. Which address prefix range is reserved for IPv4
multicast?
224.0.0.0 – 239.255.255.255*
240.0.0.0 – 254.255.255.255
169.254.0.0 – 169.25.255.255
127.0.0.0- 127.255.255.255
14. Refer to the exhibit. What would happen after the IT
administrator enters the new static route?
198.51.100.3
10.6.15.2
209.165.200.225*
209.165.202.141
The inside global address is used as the source address for
packets leaving the network
The source address for packets forwarded by the router to
the Internet will be the inside global address of
209.165.200.225. This is the address that the internal
addresses from the 10.6.15.0 network will be translated to
by NAT.
27. Which feature on a Cisco router permits the
forwarding of traffic for which there is no specific route
route source
next-hop
outgoing interface
gateway of last resort*
1.2.2 Path Determination
A default static route is used as a gateway of last resort to
forward unknown destination traffic to a next hop/exit
interface. The next-hop or exit interface is the destination
to send traffic to on a network after the traffic is matched
in a router. The route source is the location a route was
learned from.
28. Which three statements characterize UDP (Choose
three.)
UDP provides sophisticated flow control mechanisms.
UDP relies on IP for error detection and recovery.
UDP is a low overhead protocol that does not
provide sequencing or flow control mechanisms.
UDP provides basic connectionless transport layer
functions.
UDP relies on application layer protocols for error
detection.
UDP provides connection-oriented, fast transport of
data at Layer 3.
UDP is a simple protocol that provides the basic transport
layer functions. It has much lower overhead than TCP
because it is not connection-oriented and does not offer
the sophisticated retransmission, sequencing, and flow
control mechanisms that provide reliability.
29. Refer to the exhibit. What will router R1 do with a
packet that has a destination IPv6 address of
2001:db8:cafe:5::1?
Device C1 is a switch.*
Device A1 is connected to the port Fa0/5 on device
B1.
Device C1 is a switch.
Device B1 is a WLAN access point.
Device C1 is connected to device B1 through the port
Fa0/3.
38. Which two devices allow hosts on different VLANs to
communicate with each other (Choose two.)
Layer 3 switch*
repeater
router*
hub
Layer 2 switch
Routing and Switching Essentials
6.3.1 Inter-VLAN Routing Operation
Members of different VLANs are on separate networks. For
devices on separate networks to be able to communicate,
a Layer 3 device, such as a router or Layer 3 switch, is
necessary.
39. Refer to the exhibit. Host A sends a data packet to
host B. What will be the addressing information of the
data packet when it reaches host B
A.
B.
C.
D.
Correct Answers: A
40. Data is being sent from a source PC to a destination
server. Which three statements correctly describe the
function of TCP or UDP in this situation (Choose three.)
TCP is the preferred protocol when a function requires
lower network overhead.
The source port field identifies the running
application or service that will handle data returning to
the PC.*
The UDP destination port number identifies the
application or service on the server which will handle
the data.*
The TCP process running on the PC randomly selects
the destination port when establishing a session with the
server.
UDP segments are encapsulated within IP packets
for transport across the network.*
The TCP source port number identifies the sending
host on the network.
Layer 4 port numbers identify the application or service
which will handle the data. The source port number is
added by the sending device and will be the destination
port number when the requested information is returned.
Layer 4 segments are encapsulated within IP packets.
UDP, not TCP, is used when low overhead is needed. A
source IP address, not a TCP source port number, identifies
the sending host on the network. Destination port numbers
are specific ports that a server application or service
monitors for requests.
41. What is defined by the ip nat pool command when
configuring dynamic NAT?
the pool of global address*
the range of external IP addresses that internal hosts
are permitted to access
the pool of available NAT servers
the range of internal IP addresses that are translated
Routing and Switching Essentials
9.2.2 Configure Dynamic NAT
Dynamic NAT uses a pool of inside global addresses that
are assigned to outgoing sessions. Creating the pool of
inside global addresses is accomplished using the ip nat
pool command.
42. Which address type is not supported by IPv6
multicast
private
unicast
broadcast*
IPv6 supports unicast, private, and multicast addresses but
does not support Layer 3 broadcasts.
43. What is the purpose of setting the native VLAN
separate from data VLANs?
The native VLAN is for routers and switches to
exchange their management information, so it should be
different from data VLANs.
A separate VLAN should be used to carry uncommon
untagged frames to avoid bandwidth contention on
data VLANs.*
The security of management frames that are carried
in the native VLAN can be enhanced.
The native VLAN is for carrying VLAN management
traffic only.
Routing and Switching Essentials
6.1.1 Overview of VLANs
When a Cisco switch trunk port receives untagged frames
(unusual in well-designed networks), it forwards these
frames to the native VLAN. When the native VLAN is moved
away from data VLANs, those untagged frames will not
compete for bandwidth in the data VLANs. The native
VLAN is not designed for carrying management traffic, but
rather it is for backward compatibility with legacy LAN
scenarios.
44. Which ACE would permit traffic from hosts only on
the 192.168.8.0/22 subnet?
permit 192.168.8.0 0.0.3.255*
permit 192.168.0.0 0.0.15.255
permit 192.168.8.0 255.255.248.0
permit 192.168.8.0 0.0.7.255
45. Which two issues might cause excessive runt and
giant frames in an Ethernet network? (Choose two.)
damaged cable connector
using the incorrect cable type
native VLAN mismatch
a malfunctioning NIC*
excessive collisions*
incorrectly configured auto-MDIX feature
Routing and Switching Essentials
5.1.2 Configure Switch Ports
In an Ethernet network, a runt is a frame that is shorter
than 64 bytes and a giant is a frame that is longer than the
maximum allowed length. Both are often caused by NIC
malfunctioning, but can also be caused by excessive
collisions. CRC errors usually indicate a media or cable
error caused by electrical interference, loose or damaged
connections, or using the incorrect cabling type.
46. Refer to the exhibit. Which static route would an IT
technician enter to create a backup route to the
172.16.1.0 network that is only used if the primary RIP
learned route fails?
ip route 172.16.1.0 255.255.255.0 s0/0/0
ip route 172.16.1.0 255.255.255.0 s0/0/0 111
ip route 172.16.1.0 255.255.255.0 s0/0/0 91
ip route 172.16.1.0 255.255.255.0 s0/0/0 121*
Routing and Switching Essentials
2.2.5 Configure Floating Static Routes
A backup static route is called a floating static route. A
floating static route has an administrative distance greater
than the administrative distance of another static route or
dynamic route.
47. Refer to the exhibit. Which three events will occur as
a result of the configuration shown on R1? (Choose
three.)
SW3(config)# vlan 35
SW3(config-if)# end
Refer to the exhibit. A technician is programming switch
SW3 to manage voice and data traffic through port
Fa0/20. What, if anything, is wrong with the
configuration?
The mls qos trust cos command should reference
VLAN 35.
The command used to assign the voice VLAN to the
switch port is incorrect. *
Interface Fa0/20 can only have one VLAN assigned.
There is nothing wrong with the configuration.
Explain: The voice VLAN should be configured with the
switchport voice vlan 150 command. A switch interface
can be configured to support one data VLAN and one voice
VLAN. The mls qos trust cos associates with the interface.
Voice traffic must be trusted so that fields within the voice
packet can be used to classify it for QoS.
58. Which address type is not supported in IPv6?
unicast
private
multicast
broadcast *